EP0443975A2 - Method for memory management within a document history log in a data processing system - Google Patents

Method for memory management within a document history log in a data processing system Download PDF

Info

Publication number
EP0443975A2
EP0443975A2 EP91480008A EP91480008A EP0443975A2 EP 0443975 A2 EP0443975 A2 EP 0443975A2 EP 91480008 A EP91480008 A EP 91480008A EP 91480008 A EP91480008 A EP 91480008A EP 0443975 A2 EP0443975 A2 EP 0443975A2
Authority
EP
European Patent Office
Prior art keywords
history log
memory
document history
data processing
document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP91480008A
Other languages
German (de)
French (fr)
Other versions
EP0443975A3 (en
Inventor
Frederick L. Janis
Diana S. Wang
Marvin L. Williams
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US484701 priority Critical
Priority to US07/484,701 priority patent/US5142663A/en
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of EP0443975A2 publication Critical patent/EP0443975A2/en
Publication of EP0443975A3 publication Critical patent/EP0443975A3/en
Application status is Ceased legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99956File allocation

Abstract

A method for memory management within a document history log in a data processing system having multiple resource objects which are accessible by a plurality of users within the data processing system. A history log is created (64) and associated with each resource object for which documentation of selected activities is desired. Next, a maximum memory size for each document history log is specified (66) along with a protocol which dictates the order in which that memory shall be allocated (68) after the maximum memory size has been exceeded. Thereafter, documentation of each activity which relates to a selected resource object is stored (80) within its associated document history log after determining whether or not sufficient memory space is available (78). In the event sufficient memory space does not exist within the document history log, new activities are overwritten (82, 84, 86) in accordance with the specified protocol. In the event such overwriting has not been specified, an appropriate error message is generated. In this manner it is possible to ensure that activities relating to a particular resource object are recorded within a document history log after exceeding the maximum memory space of that document history log.

Description

  • The present invention relates in general to data processing systems and in particular to an improved method of maintaining multiple resource objects within a data processing system. Still more particularly, the present invention relates to a method for memory management within a document history log wherein a user may specify the manner in which memory space within the document history log shall be allocated.
  • In large modern data processing systems it is possible to create, store, and access literally thousands of documents or resource objects. Such activities may take place with regard to many users within a data processing system and it is often necessary to keep track of selected resource objects within the system to assure system integrity and maintain a record with regard to selected resource objects or documents within the system.
  • Document history logs are well known in the prior art. Many operating systems, database management subsystems and network subsystems marketed by International Business Machines of Armonk, New York incorporate logging facilities. For example, the Multiple Virtual Storage (MVS) operating system provides a logging system to the console operator so that all commands by the operator as well as the responses of the system are logged. Additionally, other events within the system may be written to the operator log. The logging filter in this system is set system wide for all resources within the system by the system programmer. As with all such logging systems this system may be utilized to provide a record for problem reconciliation and to provide an audit trait for security purposes.
  • Database management systems, such as Customer Information Control System (CICS) and Information Management System (IMS) also utilize a history log. Such history logs are typically utilized to audit events and changes within the database. These logs are then utilized to reconstruct the database in the event of an abnormal termination of the system. As above, such logs record all counts within the system based upon a filter set for the entire system by the database administrator.
  • Finally, certain network communications subsystems, such as VTAM, or Virtual Telecommunication Access Method utilize a history log system to log all network commands and responses. These logs are utilized for problem solving and are generally written to tape or disk storage.
  • In view of the above, it should be apparent that a need exists for a method of memory management within a document history log so that activities may continue to be recorded after exceeding document history log memory space.
  • It is therefore one object of the present invention to provide an improved data processing system.
  • It is another object of the present invention to provide an improved method of maintaining multiple resource objects within a data processing system.
  • It is yet another object of the present invention to provide a method for memory management within a document history log wherein a user may specify the manner in which memory space within the document history log shall be allocated.
  • The foregoing objects are achieved as is now described. The method of the present invention may be utilized to provide memory management within a document history log in a data processing system having multiple resource objects which are accessible by a plurality of users within the data processing system. A history log is created and associated with each resource object for which documentation of selected activities is desired. Next, a maximum memory size for each document history log is specified along with a protocol which dictates the order in which that memory shall be allocated after the maximum memory size has been exceeded. Thereafter, documentation of each activity which relates to a selected resource object is stored within that resource object's associated document history log after determining whether or not sufficient memory space is available. In the event sufficient memory space does not exist within the document history log, new activities are overwritten in accordance with the specified protocol. In the event such overwriting has not been specified, an appropriate error message is generated. In this manner it is possible to ensure that activities relating to a particular resource object are recorded after exceeding document history log memory space.
  • The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself however, as well as a preferred mode of use, further objects and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein:
    • Figure 1 depicts a pictorial representation of a distributed data processing system which may be utilized to implement the method of the present invention;
    • Figure 2 depicts in block diagram form a document history log system established in accordance with the method of the present invention; and
    • Figure 3 is a high level flow chart depicting the method of memory management within a document history log in accordance with the method of the present invention.
  • With reference now to the figures, and in particular with reference to Figure 1, there is depicted a pictorial representation of a data processing system 8 which may be utilized to implement the method of the present invention. As may be seen, data processing system 8 may include a plurality of networks, such as Local Area Networks (LAN) 10 and 32, each of which preferably includes a plurality of individual computers 12 and 30, respectively. Of course, those skilled in the art will appreciate that a plurality of Interactive Work Stations (IWS) coupled to a host processor may be utilized for each such network.
  • As is common in such data processing systems, each individual computer may be coupled to a storage device 14 and/or a printer/output device 16. One or more such storage devices 14 may be utilized, in accordance with the method of the present invention, to store documents or resource objects which may be periodically accessed by any user within data processing system 8. In a manner well known in the prior art, each such document or resource object stored within a storage device 14 is associated with a Resource Manager or Library Service, which is responsible for maintaining and updating all resource objects associated therewith.
  • Still referring to Figure 1, it may be seen that data processing network 8 may also include multiple main frame computers, such as main frame computer 18, which may be preferably coupled to Local Area Network (LAN) 10 by means of communications link 22. Main frame computer 18 may also be coupled to a storage device 20 which may serve as remote storage for Local Area Network (LAN) 10 . Similarly, Local Area Network (LAN) 10 may be coupled via communications link 24 through a subsystem control unit/communications controller 26 and communications link 34 to a gateway server 28. Gateway server 28 is preferably an individual computer or Interactive Work Station (IWS) which serves to link Local Area Network (LAN) 32 to Local Area Network (LAN) 10.
  • As discussed above with respect to Local Area Network (LAN) 32 and Local Area Network (LAN) 10, a plurality of documents or resource objects may be stored within storage device 20 and controlled by main frame computer 18, as Resource Manager of Library Service for the resource objects thus stored. Of course, those skilled in the art will appreciate that main frame computer 18 may be located a great geographic distance from Local Area Network (LAN) 10 and similarly Local Area Network (LAN) 10 may be located a substantial distance from Local Area Network (LAN) 32. That is, Local Area Network (LAN) 32 may be located in California while Local Area Network (LAN) 10 may be located within Texas and main frame computer 18 may be located in New York.
  • In known prior art systems of this type it is common for a user in one area of distributed data processing system 8 to access and/or modify a document or resource object within another portion of distributed data processing system 8. It should therefore be apparent that it would be very helpful to have a system whereby the activities of any or all of the users within distributed data processing system 8 with respect to a particular document or resource object may be recorded. However, with known document history log approaches the vast number of users within a distributed data processing system, such as the system illustrated, would clearly overwhelm a system which has a finite amount of memory available to record activities which relate to a particular resource object.
  • Referring now to Figure 2, there is depicted a block diagram representation of a selective document history log implemented in accordance with the method of the present invention. As can be seen, three documents are represented. Document ABC 40, document XYZ 42 and document LMN 44 are all illustrated as being under the control of library service 46. As discussed above, library service 46 may be implemented utilizing any entity within distributed data processing system 8 (see Figure 1) which is capable of acting as a resource manager for the documents thus illustrated. Additionally, a library requester 48 is illustrated. Library requester 48 shall correspond to any user within distributed data processing system 8 who desires to access a document or resource object controlled by library service 46.
  • As is illustrated, each and every document controlled by library service 46 does not require a document history log, in accordance with the method of the present invention. As is illustrated, document ABC 40 and document XYZ 42 both have associated therewith a document history log. That is, document history log 50 is associated with document ABC 40 and document history log 56 is associated with document XYZ 42. Document LMN 44 does not require a history log and no such log is illustrated.
  • In accordance with an important aspect of the present invention, it should be noted that each document history log thus illustrated includes two separate portions thereof. Specifically, document history log 50 includes a section labeled history log entries 52 and a section labeled history log attribute 54. Similarly, document history log 56 includes a section labeled history log entries 58 and history log attribute 60.
  • As those skilled in the art will appreciate, each history log entry section shall merely comprise a memory location wherein the occurrence of activities which take place with regard to an associated document may be recorded. In contrast, history log attributes 54 and 60 are utilized, in accordance with the method of the present invention, to specify the order in which the history log memory shall be allocated after the maximum size of the memory has been exceeded. In this manner, each document history log will have associated with it a memory section, such as history log entries 52 and 58. In view of the finite size of these memories the number of activities which take place with regard to a particular resource object may exceed the capability of the memory of a particular document history log. Thus, it should be apparent that additional activities which take place thereafter will either not be recorded or may be recorded in a manner which is not consistent with the requirements of the individual controlling the particular resource object.
  • By specifying, within history log attributes 54 and 60, the manner in which additional activities shall be recorded after the maximum memory size of each document history log has been exceeded it is possible to ensure that those activities shall be consistently recorded in accordance with a protocol specified by a user.
  • For example, by utilizing the method of the present invention, it will be possible to provide a memory management method for a document history log which may specify that if the recordation of an activity within a document history log will exceed the maximum memory specified for that history log, the recordation shall take place by overwriting the least recent entry within the history log. Alternately, the most recent entries within the history log may also be specified to be overwritten. By providing history log attributes 54 and 60 and permitting a user to specify the manner in which memory size shall be allocated, it will be possible for the user to retain either the earliest document history log entries or the most recent document history log entries, as desired.
  • Additionally, in a manner which will be explained in greater detail with respect to Figure 3, in the event a user has not specified the manner in which history log entries shall be recorded in the event the maximum memory size of a document history log has been exceeded, an error message may be generated notifying a specified individual or service the user of the nonrecordability of future activities with regard to a particular resource object.
  • With reference now to Figure 3, there is depicted high level flow chart which illustrates the memory management method within a document history log in accordance with the method of the present invention. As is illustrated, the process begins at block 62 and thereafter passes to block 64 which illustrates the creation by a user of a history log associated with a particular resource object. Next, block 66 depicts the specification by a user of a maximum memory size for utilization with the document history log thus created. In this manner those ordinarily skilled in the art will appreciate that a resource object having a high likelihood of activities may have a larger maximum memory size specified for the document history log associated therewith. Similarly, a resource object which is not accessible by a large number of users may utilize a document history log having a smaller memory size, thereby utilizing system memory assets more efficiently.
  • Thereafter, in accordance with an important aspect of the present invention, a user specifies a memory use protocol, as illustrated in block 68. By "memory use protocol" what is meant is whether or not the memory associated with a particular document history log may be overwritten in the event the maximum memory size has been exceeded. Additionally, such protocol may also specify whether the overwriting shall result in a new activity being recorded over the activity within the document history log which was recorded least recently or most recently, as desired by the user. Thereafter, block 70 illustrates a determination of whether or not the user has sufficient authority to specify such a memory use protocol. If the user does not have sufficient authority, block 72 depicts the generation of an error message utilizing any technique known in the art.
  • In the event the user in question does have sufficient authority to specify a particular memory use protocol for a history log, then block 74 illustrates a continuing determination of whether or not the resource object associated with the history log in question has been accessed. After determining that the resource object has not been accessed, the system proceeds iteratively, continuing to determine whether or not the resource object has been accessed. In the event the resource object associated with the history log created above then block 76 illustrates a determination of whether or not an activity has taken place with regard to that resource object which is a recordable activity. Of course, those skilled in the art will appreciate upon reference to the cross-referenced applications discussed above that the user may also specify that only selected activities from a plurality of such activities shall be recorded.
  • In the event the activity which has occurred is not a recordable activity, the process again returns to block 74 and proceeds in an iterative fashion. However, in the event the activity which has taken place is a recordable activity, as determined by block 76, then block 78 illustrates a determination of whether or not a record of this activity will exceed the maximum memory size specified for this history log. If not, block 80 depicts the recording of the activity and the process again returns to block 74 to proceed in an iterative fashion as discussed above.
  • In the event the recordation of the current activity will exceed the maximum memory size specified for the history log in question, as determined at block 78, then block 82 illustrates a determination of whether or not an overwrite of the document history log memory is permitted, in accordance with the memory use protocol specified above in block 68. If not, block 84 illustrates a notification of a specified user or service of the nonrecordability of this activity, in any manner well known in the art.
  • Finally, if the determination illustrated in block 82 indicates that an overwrite is permitted, then block 86 illustrates the overwriting of previously stored activities within the document history log, by the recording of the present activity into the memory associated therewith in accordance with the user protocol specified above in block 68. Of course, as discussed above, those skilled in the art will appreciate that there are multiple methods whereby such an overwrite may occur. For example, the present activity may be recorded into the memory associated with the document history log over the least recent activity recorded therein, or, alternatively, over the most recent activity recorded therein, as specified by the user.
  • Upon reference to the foregoing those skilled in the art will appreciate that the Applicants in the present invention have developed a method whereby memory management within a document history log may be utilized to ensure that a user may efficiently utilize system memory assets by specifying the size of memory associated with each document history log and thereafter control the manner in which activities are recorded within that memory by permitting the overwriting of new activities in the event the maximum memory size has been exceeded. In this manner, the control and maintenance of documents or resource objects within a distributed data processing system may be efficiently carried out by the efficient utilization of memory space for document history logs.

Claims (6)

  1. A method in a data processing system of efficiently maintaining a record of activities relating to a selected resource object accessible by a plurality of users within said data processing system, said method being characterized in that it comprises the steps of:
       creating a history log associated with a selected resource object (64);
       specifying a maximum memory size for said history log (66);
       specifying the order in which said history log memory shall be allocated after said maximum memory size has been exceeded (68); and
       recording (80) within said history log, in said specified order, those activities relating to said selected resource object.
  2. The method according to Claim 1, characterized in that said specified order in which said history log memory shall be allocated after said maximum memory size has been exceeded comprises overwriting those activities recorded least recently within said memory log.
  3. The method according to Claim 1, characterized in that said specified order in which said history log memory shall be allocated after said maximum memory size has been exceeded comprises overwriting those activities recorded most recently within said memory log prior to the exceeding of said maximum memory size.
  4. The method according to Claim 1, further characterized in that it includes the step of determining whether a user has authority to specify the order in which said history log memory shall be allocated after said maximum memory size has been exceeded.
  5. The method according to Claim 4, further characterized in that it includes the step of generating an error report in the event said user does not have authority to specify the order in which said history log memory shall be allocated after said maximum memory size has been exceeded.
  6. The method according to Claim 1, further characterized in that it includes the step of determining whether the recording of an activity will exceed said maximum memory size prior to recording said activity.
EP19910480008 1990-02-23 1991-01-08 Method for memory management within a document history log in a data processing system Ceased EP0443975A3 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US484701 1990-02-23
US07/484,701 US5142663A (en) 1990-02-23 1990-02-23 Method for memory management within a document history log in a data processing system

Publications (2)

Publication Number Publication Date
EP0443975A2 true EP0443975A2 (en) 1991-08-28
EP0443975A3 EP0443975A3 (en) 1992-08-05

Family

ID=23925232

Family Applications (1)

Application Number Title Priority Date Filing Date
EP19910480008 Ceased EP0443975A3 (en) 1990-02-23 1991-01-08 Method for memory management within a document history log in a data processing system

Country Status (3)

Country Link
US (1) US5142663A (en)
EP (1) EP0443975A3 (en)
JP (1) JPH04217037A (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5528759A (en) * 1990-10-31 1996-06-18 International Business Machines Corporation Method and apparatus for correlating network management report messages
GB2268292A (en) * 1992-06-16 1994-01-05 Ibm Error handling in a state-free system
JPH07210450A (en) * 1994-01-11 1995-08-11 Fujitsu Ltd Method for controlling memory and device therefor
US6202098B1 (en) * 1995-01-04 2001-03-13 International Business Machines Corporation Method and system for object oriented notification
US5940830A (en) * 1996-09-05 1999-08-17 Fujitsu Limited Distributed document management system
US6493731B1 (en) * 1999-01-27 2002-12-10 Xerox Corporation Document management system for recording and viewing the history of document use
US6505219B1 (en) * 1999-01-27 2003-01-07 Xerox Corporation Process management system wherein process descriptions provide indices to document histories
EP1087306A3 (en) * 1999-09-24 2004-11-10 Xerox Corporation Meta-documents and method of managing them
US6708333B1 (en) * 2000-06-23 2004-03-16 Microsoft Corporation Method and system for reporting failures of a program module in a corporate environment
JP4563794B2 (en) * 2004-12-28 2010-10-13 株式会社日立製作所 Storage systems and storage management method
US8429654B2 (en) * 2006-07-06 2013-04-23 Honeywell International Inc. Apparatus and method for guaranteed batch event delivery in a process control system
US8718807B2 (en) 2012-03-23 2014-05-06 Honeywell International Inc. System and method for robust real-time control of regular automated production using master recipe

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4757533A (en) * 1985-09-11 1988-07-12 Computer Security Corporation Security system for microcomputers

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3704363A (en) * 1971-06-09 1972-11-28 Ibm Statistical and environmental data logging system for data processing storage subsystem
JPS55157181A (en) * 1979-05-25 1980-12-06 Nec Corp Buffer memory control system
US4437155A (en) * 1980-11-14 1984-03-13 Sperry Corporation Cache/disk subsystem with dual aging of cache entries
JPS62150444A (en) * 1985-12-23 1987-07-04 Nec Corp Software operation tracing device
JPS63288339A (en) * 1987-05-20 1988-11-25 Nec Corp Managing method for individual processor history
US4823310A (en) * 1987-08-10 1989-04-18 Wang Laboratories, Inc. Device for enabling concurrent access of indexed sequential data files
JPS6488860A (en) * 1987-09-30 1989-04-03 Nec Corp Communicating control equipment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4757533A (en) * 1985-09-11 1988-07-12 Computer Security Corporation Security system for microcomputers

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
3RD INT. CONF. ON DATA ENGINEERING 3 May 1987, LOS ANGELES, CA, USA pages 518 - 525; R.R. HENNING ET AL.: 'Computer Architectures, Database SEcurity, and an Evaluation Metric' *
IBM TECHNICAL DISCLOSURE BULLETIN vol. 25, no. 1, June 1982, ARMONK, NEW JERSEY, USA pages 428 - 430; F.D. LAWLOR ET AL.: 'Vertical Microcode Log' *
SOFTWARE PRACTICE AND EXPERIENCE vol. 16, no. 2, February 1986, CHICHESTER, SUSSEX, GB pages 183 - 200; B.P. MILLER: 'ADistributed Programs Monitor for Berkeley UNIX' *

Also Published As

Publication number Publication date
JPH04217037A (en) 1992-08-07
US5142663A (en) 1992-08-25
EP0443975A3 (en) 1992-08-05

Similar Documents

Publication Publication Date Title
US6266060B1 (en) Menu management mechanism that displays menu items based on multiple heuristic factors
US9092439B2 (en) Virtualized data storage vaults on a dispersed data storage network
US8583881B1 (en) Method, system, and program for implementing retention policies to archive records
US6651075B1 (en) Support for multiple temporal snapshots of same volume
US6880051B2 (en) Method, system, and program for maintaining backup copies of files in a backup storage device
US6526418B1 (en) Systems and methods for backing up data files
US5819272A (en) Record tracking in database replication
US7657721B2 (en) Method of maintaining a plurality of snapshots, server apparatus and storage apparatus
US7237075B2 (en) Persistent snapshot methods
US8312063B2 (en) Method for storing data for retrieval and transfer
US7644245B2 (en) Systems and methods for detecting and mitigating storage risks
US9229646B2 (en) Methods and apparatus for increasing data storage capacity
US8782009B2 (en) Method and system for electronic file lifecycle management
US7673324B2 (en) Method and system for tracking an operating performed on an information asset with metadata associated therewith
US6253204B1 (en) Restoring broken links utilizing a spider process
KR101658964B1 (en) System and method for datacenter workflow automation scenarios using virtual databases
US7136918B2 (en) Method for monitoring abnormal behavior in a computer system
JP2538721B2 (en) De - multiple data of the data processing device - a method of controlling public access to data objects
US7536291B1 (en) System and method to support simulated storage operations
US6311213B2 (en) System and method for server-to-server data storage in a network environment
US7558856B2 (en) System and method for intelligent, globally distributed network storage
US7891003B2 (en) Enterprise threat modeling
EP0952698A2 (en) System and method for restricting database access to managed object information using a permissions table
US20050076042A1 (en) Method, system, and program for archiving files
US7406473B1 (en) Distributed file system using disk servers, lock servers and file servers

Legal Events

Date Code Title Description
AK Designated contracting states:

Kind code of ref document: A2

Designated state(s): DE FR GB

17P Request for examination filed

Effective date: 19911211

AK Designated contracting states:

Kind code of ref document: A3

Designated state(s): DE FR GB

17Q First examination report

Effective date: 19950419

18R Refused

Effective date: 19960808